Cyber Criminality & It's Legal Control: Fighting With Stones In Jet Age
Cyber Criminality & Its Legal Control: Fighting
With Stones in Jet Age
Vijaykumar Shrikrushna Chowbe
Associate Professor and Head, Post Graduate Teaching Department of Law, Sant Gadge Baba
Amravati University, Amravati, India [email protected]
THEME THEME THEME
THEME BASED PAPER BASED PAPER BASED PAPER BASED PAPER
Cyber Criminality & It's Legal Control: Fighting With Stones In Jet Age
Cyber Criminality & Its Legal Control: Fighting
With Stones in Jet Age
Shrikrushna
Associate Professor and Head, Post Graduate Teaching Department of Law, Sant Gadge Baba
Amravati University, Amravati, India
ABSTRACT
Cyber criminality has revealed the loopholes and shortcoming of national systems, exposed the inability of combating Trans border criminality and inability of the legal systems to deal with the cases involving virtual realities where paper based identities, physical location, national borders depicting jurisdictions melted out. The existing legal systems are mostly paper based and very much sensitive to the geographical maps where artificial boundaries create national jurisdiction, which is the only legitimate medium to take cognizance of crime. It is also very much sensitive to paper based identity, physical location, legal recognition of criminal act. The electronic technology has potential to crack the old age principles, which hardly stand in cyberspac The present article has focused upon the gap between the traditional ideologies to combat the crime and varied nature of cyber criminality. It clearly demonstrates the difference between Cyber crime and traditional crime. It highlighted the causes, nature, and difference of technology and ultimately demands the modern approach to deal with the crime. At the end, it also press upon the international policy, regulations and standards to deal with such trans-national criminality.
KEYWORD
Cyber Crime Legal approach
Cyber
criminality Technology
Page 47
ABSTRACT
yber criminality has revealed the loopholes and shortcoming of national systems, exposed the inability of combating Trans border criminality and inability of the legal systems to deal with the cases involving virtual realities where paper based physical location, national borders depicting jurisdictions melted out. The existing legal systems are mostly paper based and very much sensitive to the geographical maps where artificial boundaries create national jurisdiction, ate medium to take cognizance of crime. It is also very much sensitive to paper based identity, physical location, legal recognition of criminal act. The electronic technology has potential to crack the old age principles, which hardly stand in cyberspace.
The present article has focused upon the gap between the traditional ideologies to combat the crime and varied nature of cyber criminality. It clearly demonstrates the difference between Cyber crime and traditional crime. It highlighted nature, and difference of technology and ultimately demands the modern approach to deal with the crime. At the end, it also press upon the international policy, regulations and standards
national criminality.
KEYWORDS
Genetic algorithm
y
THEME THEME THEME
THEME BASED PAPER BASED PAPER BASED PAPER BASED PAPER
Cyber Criminality & It's Legal Control: Fighting With Stones In Jet Age Page 48
PREAMBLE PREAMBLE PREAMBLE PREAMBLE
Cyber crime is one of the deadliest types of crime. It can disturb existing set-up within the fraction of seconds. This can be evident from the 9/11 incidence when two airplanes were crashed against twin towers of World Trade Centre in New York.
Within a couple of minutes all the data within the server located at twins towers lost and the transactions corresponding with these computers, which were taking place, halted. More dangerous would be the situation when globalization provides the connectivity to any computer from any corner of the world. Thus, it may be possible that within the fraction of seconds, some of the server would collapse and the transactions pertaining to those servers may also come to halt. Thus the major threat appear today is due to the globalize nature of Computer & Information Technology which may spread its effect beyond the boundaries. Thus if anything would go wrong in China, it may effect in the business market of India. If any American Bank would become bankrupt either due to e-theft committed or due to hacking, the share market index of Bombay Stock Exchange may fall down!! Thus, Cyber criminality has potentiality to show its effect across the globe.
Therefore, the present article has focused its attention upon how Computer Technology helps to revolutionize the concept of Information Technology and how its globalised nature would have probable threat to the national legal systems. At the same time, the investigation will be carried out in keeping the present wave of globalization and its effect on criminality in view. Ultimately, an analysis will be made about the Cyber criminality and how it has been activated and affected due to invention of Computer & Information technology.
UNDERSTANDING CYBER CRIMINALITY
Why Cyber criminality - What went wrong?
Another aspect about Cyber criminality should be taken into consideration. Why, today, does the stage have arrived to make hubbub about Cyber crime? Exactly what went wrong? In mid of the twentieth century Cyber-Technology appeared on the scene and it is adopted by the society for conducting transactions, communication and for other purposes. Due to wide alternatives, capability of carrying out assignments, speed, executing
operations, memory storage capacity, it spread with leaps and bounds and soon encompassed entire globe.
Till the end of last millennium Cyber Technology had advanced throughout the world on experimental basis and it had been started to make impact in different corner of the world and different sphere of life. But unfortunately, despite itβs increasing use, despite the increasing automation process, despite increasing dependence of man on the machine, no sincere research base effort had yet been undertaken to check its impact on other aspects of life. Thus by the end of 20th century, we had contrast picture. A developed technology and underdeveloped legal mechanism to deal with.
CYBER CYBER CYBER
CYBER ---- TECHNOLOGY VIS TECHNOLOGY VIS TECHNOLOGY VIS TECHNOLOGY VIS ----Γ Γ Γ---- Γ VIS CYBER CRIME VIS CYBER CRIME VIS CYBER CRIME VIS CYBER CRIME β
β
β β CHANGE OF PACE CHANGE OF PACE CHANGE OF PACE CHANGE OF PACE
The problem of Cyber crime can be understood by understanding Cyber Technology. The world is witnessing the situation of ever-growing field of Cyber-Technology. The technological growth rate is too fast. In last decade itself, the number of netizens increased by 1500 % in India. Banks, insurance companies, railways, and universities are installing computers for their speedy operations.
Thus Technological Adoption is at it peak. However, the problem of Cyber criminality oozing out of Technological Adoption is not properly tackle along the line of its growth. Thus, the period has been witnessing the different pace of development between Cyber Technology and infrastructure in preventing Cyber crime. Within a short span of decades, a huge gap between Cyber Technology and Cyber criminality has happened without any hope of bridging the gap.
Consider the example of India itself. India is considered as a 'think-tank', 'best brains', βsilicon valleyβ of computers, having maximum numbers of computer engineers and experts, and we are also exporting our software and hardware engineers equipped with specialized technological brain to America too! Thus statistical data manifest that India is one step ahead in Cyber-Technology than rest of the world! India is fit country for outsourcing material form developed countries! But what about the knowledge and mechanism of controlling the Cyber crime?
THEME THEME THEME
THEME BASED PAPER BASED PAPER BASED PAPER BASED PAPER
Cyber Criminality & It's Legal Control: Fighting With Stones In Jet Age Page 49 The same situation is prevailing in the world. In fact,
it is desirable and expected that during the infant age of Cyber-technology; the legal mechanism would have to start to shape its utilization, distribution, dissemination and consumption.
However, since from the beginning the Cyber- technology was started to use, experimented, exhausted and consummated, but not legally regulation till late 90s. This leads to wide gap between technological development and legal regulatory mechanism. The social mechanism in general and legal mechanism in particularly would have to come forward with their regulatory weapons.
If those strategies would have been followed, there might exist the Computer Technology and controlling mechanism at the same level of development.
However, it can be clearly evidenced that the pace of development of Computer Technology vis-Γ -vis Legal mechanism to control Cyber crime was not at the same pace where former has been growing with leap and bound and latter remain hidden and laying dormant. Thus, it is regretful situation to evidence our failure to safeguard the present generation.
Today, adoption of technology has no alternative without any protective wrapping against its evil effect on society.
Speaking about India, to educate kids about computers, technology, computer games, chatting, by compulsory MS-CIT courses, by making computer education compulsory at primary level of education become fashion, but words like Cyber crime still sound new to their ears! Thus when generation together is assimilating computer literacy without legal awareness and criminal implications.
The educational curriculum of these courses about of computer technology hardly contains the awareness about Cyber crime.
The ignorance of computer related crime can simply be understood in India when in banks, government offices or at sensitive places; the office personnel are using simple passwords like names, surnames, pet names, and school names. Such use of simple 'guessable' password at sensitive places clearly evident how sensitive the people in India about security aspects of their computers. At number of occasions, it has been observed that the Internet ID and Internet password is same in most of the institute which may facilitate to cause theft of Internet hours.
In short, the demand of alteration in the existing situation is already overdue!
CYBER CRIME CYBER CRIME CYBER CRIME
CYBER CRIME β β β β A DISCUSSION FROM LE A DISCUSSION FROM LEGAL A DISCUSSION FROM LE A DISCUSSION FROM LE GAL GAL GAL POINT OF VIEW
POINT OF VIEW POINT OF VIEW POINT OF VIEW
Cyber crime - Law prescribes, not describes Cyber criminality.
Crime is phenomenon, which requires focusing on Sociological, Political, Economic, Law and other related branches to understand it in comprehensive manner. As this article undertaken from legal point of view, it is essential to analyze Cyber-criminality from legal point of view. It is should be borne into mind that crime is the phenomenon which is generally considered from legal point of view.
Understanding Cyber crime from legal point of view causes difficulties because law can only prescribe, couldnβt describe. Thus legal literature says, βWhat is crimeβ? But mute about βWhy is it soβ?
General Characteristics of crime - Considering some prevailing notions
'Crime mean the act punishable at law'. 'Crime mean the act for which the law prescribes punishment',
βCrime are harmful, anti-social actsβ are general prevailing notions into the society. Crime without legal prescription is myth and merely remains evil or sin if legal aspects are withdrawn. However, careful study of word 'crime' reveals some objections.
By way of generalization, some common principles may be extracted that (can) apply ideally to all crimes and are the criteria actually used in determination of certain act branded as crime or is not crime. They are consistent with the ideal characteristics of the whole body of the criminal law.
Basically politicality, specificity, uniformity, and penal sanctions are considered general major constituent for categorizing any act as crime.
Whether βoffenceβ or 'Crime'
It is surprised to note that the major lex-loci on law of crimei is silent about the definition of word βcrimeβ.
And even in the said statutes, word βoffenceβ is used instead of βcrimeβ. Incidentally, too, the IT Act, 2000ii does not define the expression 'Cyber crime' but only punishes a few of the many Cyber crime.iii
Again, Indian Penal Code, 1860 word
βoffenceβ defined :-
βExcept in the chapters and sections mentioned in clauses 2 and 3 of this section, the word
βoffence denotes a thing made punishable by this code.βiv
In the same manner, word βcrimeβ has not been defined under Indian law.v General Clauses Act also
THEME THEME THEME
THEME BASED PAPER BASED PAPER BASED PAPER BASED PAPER
Cyber Criminality & It's Legal Control: Fighting With Stones In Jet Age Page 50 defined the word βoffenceβ instead of word βcrimeβ.
The same scheme has been adopted in Criminal Procedure Code, 1973.
The word βoffenceβ defined under Criminal Procedure Code, 1973 is as follows:
βOffence means any act or omission made punishable by any law for the time being in force and includesβ¦β¦β¦.βvi
Thus according to penal law, βoffence means any act or omission for which the any law time being in force imposes penal liability.β In short, those acts fall within the preview of penal laws for which any law time being in force prescribes punishment. The scheme adopted to describe the act or omission to be attracted the attention of criminal laws is based on positive approach. Therefore in generic sense
βthe act or omission that is not yet made punishable by any law time being in force is outside the scope of criminal law.β Again the definition of 'offence' is seems to be circular. Because it only says that offence is the act punishable at law.
Difference between 'Offence' and 'Crime' Difference between 'Offence' and 'Crime' Difference between 'Offence' and 'Crime' Difference between 'Offence' and 'Crime'
Though penal statutes make use of the word
βoffenceβ, it is not synonyms with word βcrimeβ.
Despite some common constituent elements like βact forbidden by lawβ βlegally prescribe penal liabilityβ, βby state enactmentβ are common factor of βoffenceβ and
βcrimeβ. However the nature and scope of word
βoffenceβ and βcrimeβ differ on various grounds.
βThe difference between the two is one of (the) degree: A moral culpability is involved in a crime, such as theft, homicide; but there may not be any moral condemnation in a statutory offence, such as a violation of the provisions of the Motor Vehicles Act, or rash driving. They are, no doubt, acts prejudicial to the society, but they are punishable only because the law has prohibited certain conduct, and not necessarily because the act or omission is regarded by society as morally wrong. From the wrongdoerβs standpoint, again, βmens reaβ or a guilty intention is, generally, a necessary ingredient in a crime but not so in a statutory offence. In short, all grave offences involving moral turpitude and punishable by the State are called crimes. The object of punishing crime is to set an example, that is to say, to give a warning to persons in general not to cause such injuries affecting the interests of the community as whole; while the object of punishing
an offence is the interest of improving the social condition and efficiency.vii
This is clear from the above discussion that βoffenceβ
is a wider term having extended connotation than word βcrimeβ and definition of offence (according to criminal law) also encompasses the criminal act.
Thus offence includes βact regarded as crimeβ as well as βact punishable due to public policyβ (more specifically, like negligence, accident). From the generic sense, the approach adopted in penal statutes can appreciate. Because entire legislative framework comes forward with enactments declaring certain act prohibited by law irrespective whether they fall strictly within the definition of crime. And on the contrary some act, which may fall within the definition of crime, may not occupy place in the strictly enacted statute.
When the crime has to be studied from various angles including legal one, it is required to step out of the strict legal definition. Because, in order to consider those premises of act which though not fall within the strict definition of law, but are harmful, anti-social in nature, legal definition restrict the coverage area. Again, statutes, acts, cases are too much logical where the effort has been made to analyze whether the act fall within the strict wording of printed law or not. However, from the academic point of view, it requires to study the act, its effect and harm it causes, despite printed law may not describe it.
It should also be noted down that the rules of criminal law contain only definitions of specific crime, such as criminal conspiracyviii, obscenityix, theftx, extortionxi, Robberyxii, Criminal breach of trustxiii, Stolen Propertyxiv, cheatingxv, Criminal Trespassxvi, Forgeryxvii, Defamationxviii, and Criminal Intimidation.xix However study of criminology reveals that legal scholars have been able to abstract certain general principles from such definitions.
These general principles apply ideally to all crimes and are the criteria actually used in determination of whether any particular behavior is or is not criminal.
Thus the definition of crime (in positive way) that appears in the statutory enactment may differ from the standpoint of criminal jurisprudence. Because the coverage area of criminal jurisprudence definitely wider than merely the criminal enactments which deal criminality focusing strictly on the provisions of imposing criminal liability. So far as criminal jurisprudence is concern, the extract of the study consistent with the ideal characteristics of the
THEME THEME THEME
THEME BASED PAPER BASED PAPER BASED PAPER BASED PAPER
Cyber Criminality & It's Legal Control: Fighting With Stones In Jet Age Page 51 whole body of the criminal law. Thus the present
research writing has been executed with the approach of βto abstract certain general principles (that can be) apply ideally to all Cyber crime[s] and are the criteria actually used in determination of whether any particular behavior is or is not criminalβ.
Then can Cyber - crime really categories as crime?
Genetically, no person can be prosecuted for an act, which is not declared as crime at the time of commission of an act. The Constitution of India also guaranteed,
Art 20: Protection in respect of conviction for offences. -
No person shall be convicted of any offences except for violation of law in force at the time of the commission of the act charged as an offence, nor be subjected to a penalty greater than that which might have been inflicted under the law in force at the time of the commission of the offence. xx
Thus in India, punishment without prior declaration of any acts as an offence or crime is bared by Constitutional mandate. The majority of an acts fall under new category as 'Cyber crime' is still to be declared as an offence. The Information Technology Act, 2000xxi has neither described the 'Cyber crime' nor categorized it. Only the punishments have been prescribed for certain act such as tampering with computer source documents,xxii hacking with computer system,xxiii publishing of information, which is obscene in electronic form.xxiv
However, apart from these traditional crimes there are other categories of Cyber crime that are not covered by the Information Technology Act, 2000 for e.g. Cyber stalking, vandalism, the Spam, and network worm, Packet Sniffing, denial of service attack etc. Cyber crime is equally harmful, anti- social having all the characteristics and qualities being declared as an offence but it is still out of the purview of the Information Technology Act, 2000 or any other law time being in force. Therefore, within the couples of years of its inception, most of the jurists are considering the Information Technology Act, 2000 as outdated.
Considering these aspects, and reading it with Article 20 of the Constitutional of India that guarantees a protection from ex-post facto law, it is
difficult to treat it as an offence. Thus genetically, and strictly speaking from legal point of view, have discussed about crime in this article and analyzed it from the angle of crime may be out of the purview of legal literature.
CYBER CRIME - GRAY AREAS: A COMPARATIVE EVALUATION WITH TRADITIONAL CRIME
During the past decade, the growth in the use of the Internet and the (Cyber) space it has created, has developed from science fiction into a socially constructed reality. Cyberspace possesses some unique qualities which create a series of challenges for our existing laws.
These qualities are: its lack of respect for jurisdictional boundaries, the sheer volume of traffic that it can handle virtually instantaneously, its openness to participation, the potential for anonymity of members of the virtual community, its apparent economic efficiency. It is these very qualities of Cyberspace, which has today become its nemesis and has necessitated the need for Cyber law.
Cyber law exists at the (cutting) edge of law, where the ability of existing law to achieve its goals is challenged. In this sense the "law" in Cyber law is a much broader concept, it is "law in action" as opposed to "law in books" as it applies to situations where Law cannot cope. Moreover, the technological revolution has wrought in its wake various security issues and there was an urgent need for security experts as well.xxv
i. Present system - suits to traditional criminality & fall short for Cyber- crime
Today, Cyber crime has settled on Indian scene. But Indian Legal System is still alienated towards it. It is expected that the regulatory mechanism should pick up the task of controlling the process before it outweigh and collapse. But in this respect, machinery of legal control is clearly seems to be lagging behind. Therefore, new development in this area posing challenges to the fundamental principles of law, which worked well before the advent of this technology. Our legal literature is worn out, if not become outdated. The present system is suitable to some extent to deal with traditional criminality only.
THEME THEME THEME
THEME BASED PAPER BASED PAPER BASED PAPER BASED PAPER
Cyber Criminality & It's Legal Control: Fighting With Stones In Jet Age Page 52 Need of reformation in this regard is already
overdue.
ii. In the age of ICT, threat is non- optional and bound to increase We are aware that today, the life without computer is difficult to imagine. It is observed that, "Only a hermit would be unaware of the degree to which computers have permeated every aspect of our lives. From the cradle to the grave our activities are influenced, tracked, recorded and controlled by computers".xxvi Computers get associated with a person before his birth when CAT scanners detect birth defect or determine sex and remain associated for sometime even after the death till insurance issues are settled. Computers have invaded every aspect of the life and the impact has been so quick that it caught the institutions of law and justice unawares.xxvii Thus for modern generation, computer associated with human life from womb to tomb. The new developments are posing challenges to the fundamental principles of law, which worked well before the advent of this technology.
And with the increase in automation and use of Cyber Technology, the scope and its danger is bound to increase. No words can better describe the present scenario of technology than the following stated by Cosmos-the villain in the movie "Sneaker"
in following words -
The world is not run by weapons any more, or energy or money, it is run by ones and zeroes-little bits of data. It is all electrons. There is a war out - a world war. It is not about who has the most bullets.
It is about who controls the information. What we see and hear, how we work, what we think. It is all about information.xxviii
However, Cyber Technology throughout the world is with its full magnitude, but socio-legal awareness amongst the people is not yet highlighted.
Therefore, the Cyber criminals today are wandering freely, without threat and fear. We can compare the present society with the innocent baby who is trying to play with fire-works unaware of its potential danger it may cause. The present society is also too much innocently dealing the Cyber Technology remaining deaf and blunt from the probable danger the Cyber criminality may cause.
iii. What role can Legal system be loaded with?
In modern civilized societies, 'Law' can be the most effective instrument of social control and social
change. 'Law' should like filter paper, anti virus, gatekeeper and purifying machinery for Cyberspace.
Therefore, if 'Law' has to fulfill social expectations, it must keep itself one step ahead, well equipped, advanced and sensitive towards social change. In modern days, 'Law' cannot afford to remain oblivious of these developments and lose relevance.xxix Today, 'Law' must be advanced and well prepare and acceptance of new development into the society should be under strict supervision of legal system.
Legal system should armed and guard society against any probable danger from changing process.
For effective controlling and safeguarding the social interest emerging from challenges of developmental process, it is expected that 'Law' must keep its supervisory eyes on all the changes before it reach for application and use in society and must be scrutinized and filtered through 'Legal' machinery before passing to social hands.
iv. New challenges before legal machinery
It is therefore, a time to redefine the role of 'Law' and legal machinery in present context. Before 'Law' loss it relevance, it must modernized, define new terminology which can suits to existing situation, develop framework and network to check challenges. Cyber crime should have its own vocabulary, terminology, jurisdiction base and each level need special attention. The situation demands that there should be a concrete effort on the part of the Lawyers, Judges and Legislature to resolve the legal issues rises while information sharing, dissemination, distribution and consumption. There is genuine feeling that the new world of digits demands training not only to the Bench and Bar but also to law enforcement agencies as new language has been introduced which has given new meaning to old words.xxx The Colonial law had its own working methodology. The colonial methodology restricted with conferring rights, imposing duties and creating liabilities, the responsibility with strict colonial execution, and rest things would follow.
But, today, when we claim is being made to be 'welfare state', this fashionable βcolonial wayβ of working pattern is outdated. Affirmative action on the part of law enforcing agencies is simply a need of an hour.
v. Need of balancing offline world and online world
It is necessary today to give a thought of balancing the offline and online world. As stated earlier, the Cyber-technology has opened the entirely different
THEME THEME THEME
THEME BASED PAPER BASED PAPER BASED PAPER BASED PAPER
Cyber Criminality & It's Legal Control: Fighting With Stones In Jet Age Page 53 world, the space where we live in electrons, breath it
and move along in the form of electrons and bytes.
It has created a visual world, entirely different than our social world. The Cyber-space has computer games, conferences, chat rooms, shopping complex everything we have in real world, but with different atmospheres.
Just take an example of computer games. There are traditional games like cricket, carom, Gulli- Danda, Kabbaddi etc which used to be played by children with their counterparts. But computer games are being played by these kids of present generation by sitting in closed rooms without human company, and most of the time, they are even unwilling to be got disturbed, and these games hardly provide any social atmosphere which would doctrines the process of socialization. The youth, one can find, sitting hours together in closed cabin of Cyber cafΓ© wandering in chat rooms, but more resembling liking sitting in toilet, because he is lacking social surrounding. It gives a sense of belongingness in different world. The kids before TV cartoon, or youth in chat rooms are playing in isolation. They are entirely in different world where they donβt need their classmates, no friends, nothing, and if having, everything is imaginary! The computer games are satisfying their lust, fantasy, visualizing them as a powerful winner! Ultimately this makes them computer-worm, the kid who just likes to play with computer and donβt like the company of others. Even they donβt need their parents.
Today most of the parents are making complaints that their kids are becoming addict of computer games, and TV cartoon shows, and youth are computer savvy, and driving out of their bond of love. They spend maximum time before computers - surfing and fun-liking games. This is equally true with the youth who are spending their valuable time in chat room where they can meet imaginary friends and can share their fantasy. They can fall in love, share emotions, goes on dates but hardly anything is real!xxxi The social ties existed before are much more solidified, exerting social pressure, and capable of holding social members with social adhesion. Thus, a couple of generation before, man who has been ex-communication, banishment, isolation, confinement, and keeping outside the society would considered as punished and would felt lowering down of image in society. Person would have felt uneasy even to think about it. However, today, everyone is running towards electronic
machine. In past, persons used to feel amusement, entertainment and consolation from social relation, today electronic toys are provided lots of amusement, visual powers and playing fun where nobody want to spare time for others, even for parents, brothers, and friends too!
In nutshell, life in virtual world is responsible for mushrooming various psychological problems amongst the generations. They are becoming addict of computers which is able to satisfy their fantasy, sometime good - sometime bad. But definitely this visual world is driving them away from real world.
Though the present article has attentped the enquiry and focused from the pointing of view of the controlling criminal aspect of this Cyber-technology, but the seriousness of the problem can not be easily side-tracked. To add statistical figures, NESCOM research data forecasted that Indian Computer Market has possibility to raised 40 million Dollars by 2006.xxxii Imagine how much kids, youth and fun lover in near future will be affected by it?
Revolution in Information & Technology is admirable, but its impact on human generation cannot be blindly appreciated. It is, essential, therefore that much attention should be given to balance between visual and real world.
CYBER CYBER CYBER
CYBER CRIME CRIME CRIME CRIME ---- WHERE THE DIFFERENCE WHERE THE DIFFERENCE WHERE THE DIFFERENCE WHERE THE DIFFERENCE LIE? LIE?
LIE? LIE?
Consider a situation existing before a couple of years. What was the concept of securing the money? How did a few lakhs rupees in Government Treasury use to secure against theft? There was vault constructed by sturdy metal, the location of strong vault-room was either in the centre of premises or underground. One has to pass through two to three doors that were guarded by codes or locks having several keys held by different persons.
There were narrow passages, dim lights and security guards patrolling aground the premises with standing orders to arrest any unauthorized, suspected persons. He would be immediately taken into custody for interrogation. Even patrolling security guards with guns had standing order to shoot the person attempting to commit robbery.
Notwithstanding these safeguards, there were electric current running through the iron bars, security sirens, police dogs. And even if, the robbery would have been committed, the police machinery could seal all the barriers to trap criminals. Numbers could trace the stolen currency;
THEME THEME THEME
THEME BASED PAPER BASED PAPER BASED PAPER BASED PAPER
Cyber Criminality & It's Legal Control: Fighting With Stones In Jet Age Page 54 the suspected accomplice could be arrested to get
any clues.
HOWEVER, WHAT IS THE SITUATION TODAY?
Today, the Cyber-Technology has entirely changed the concept of security and safety. Printed currency is transformed into electronic bytes and capable of moving through optic fibers. Now one can have a simple ATM card, which carries Crores of rupees, and e-banking has facilitated the withdrawal of amount from any place, even from any corner of the world! The currency is in the form of electronic bytes and can be flow through wire, can be transferred by satellite transmission and capable to carry on a simple Credit/Debit cards. But can we rest assure about the safety of these digital money? Though being controlled by bank's server? Does bank server secure as strong vault-room were? How much security aspects of previous days are significant today? Today anybody can hack, intrude in the bank website and make changes to commit theft.
No need to have physical presence! No need to breaks locks, no need to have duplicate keys, even no need to have identity cards, need not have to face patrolling guards, no fear of guns, checking at barriers, chasing by dog squad, check posts, or tracing by currency numbers! Today one can easily breaks strongest firewalls of bank server. What is needed? A few lines of programming!
It is therefore taken into consideration that the study of any sort of crime is continuous process.
Whatever best study made in past may be good but not relevant during the course of time. This is equally true with other dynamic concepts, because it require continuous indomitable perseverance. The study material of this subject is continuously subjected to change and therefore, it needs a fresh look each time. The study material of crime is just like a flow of current stream where present will be soon imbibed by recent past. Also in this electronic age, concepts are subjected to the change with electric speed.
Thus, the Cyber-Technology has made the life transactions more dangerous and deadliest in modern days, because it has entirely changed the concept of money, property, security, safeguard and has brought everything at the stake! In the Cyberspace, nobody is safe, nobody can feel protected! Today, even one cannot sleep quietly with the thought that his money is safely laying in his bank account? Really does one think that he, his
money, or even banks, which were once having safest lockers, has remained as strong enough to protect his money? Just read any newspaper! Go to columns covering news relating to Cyber crime, relating to economic frauds through ATM (Automatic Teller Machine).
Guess, this is only one example of Cyber crime related to money transactions, thousands of new types are yet to describe, yet to emerge and yet to face!!
INDIAN LEGAL SYSTEM INDIAN LEGAL SYSTEM INDIAN LEGAL SYSTEM
INDIAN LEGAL SYSTEM β β β β NEITHER NEITHER NEITHER NEITHER IIII NDIGENOUS NOR MODERN NDIGENOUS NOR MODERN NDIGENOUS NOR MODERN NDIGENOUS NOR MODERN
According to Puchta, βLaw of the nation grow with the people, strengthen with the nation as it strengthen and lastly die away when nation lost its nationalityβ.xxxiii Thus basic thrust of those thinkers who belongs to Historical School feel that law of the nation reflect true picture of nationality and by studying law, one can understand the socio-political situation existing into society. However, the statement does not appear true if scrutinize with the Indian scenes. As Indian Legal System reflects colonial dominance, present laws of the nation neither provide true picture, nor display reality. This is equally true with respect to criminal justice system in India.
i. Intricacy in pursuing Law as a mirror image of social reality
In India, while attempting to define legal terminology from social point of view always encounters some cynicism, particularly to figure out the concept like crime. While attempting to understand and conceptualize legal mechanism for socially correlated issues, it come across with some difficulties and necessitates stepping out of legal reservoir to make this article more relevant.
Because Indian Legal system reflects, peculiar colonial influence and culminated to define law in way of Austinian logical rationalization. Thus development of Indian legal system, during pre- colonial and post-colonial period manifests the dogma of imported rhetoric idealization and nationwide generalization of law in Benthamite way that makes it difficult to discover indigenous characteristic features and appreciate it as well.
Particularly, when we envisage the purpose and functionalistic approach of law for social reformation and renovation like, 'law as an instrument of social change', OR 'Law as a product of culture and tradition', assigning socio-functional role (and
THEME THEME THEME
THEME BASED PAPER BASED PAPER BASED PAPER BASED PAPER
Cyber Criminality & It's Legal Control: Fighting With Stones In Jet Age Page 55 values) to 'law', the careful study reveals some
objections.
ii. Colonial impact on India Legal System make it alien for natives Another problem of Indian legal system is that of colonial impact on legal system. From Language to Law in Indian Legal System, everything manifest colonial influence. This makes Indian Legal System alienated to indigenous society. In India most of the laws are either of British origin or passed during the first three decades after Independence. During the colonial period, though some development was took place, but it was enacted focusing the interest of ruler. Thus law enacted during this period supported colonization and true spirit of law as an instrument of social development was totally sidetracked. In the first three decades after independence, though the effort had been made to make overall system socially compatible, the computers were not dawn on the scene.
Therefore, the law passed during this period totally unaware about computers, and it is equally true about the system develop during this period.xxxiv Thus the period when computers had not made so much of influence as we see today and Internet, during this period, simple did not exist.
Most of the existing laws assume physical environment, geographical boundaries, and tangible documents as prime concern and created jurisdictional limitations for administration of criminal justice system. As against this, in a digital world every thing is recorded in digits, without any respect for political boundaries and can be modified, altered and replaced without any murmur.xxxv Born as part of an intelligence military system, Internet has become an essential means of communication and information with great democratic potential as an organizational tool for social movements challenging the domination of political and economic power.xxxvi
iii. Law incompatible with society &
understanding Society by reading law is futile
Commenting on the difficulties encountered to understand India from legal standpoint, Mark Galanter remarked-
The attempt to use law as a path to the understanding of modern India (Indian law as well) encounter skepticism from several quarters. Before proceeding to examine the possible significance of legal studies, I shall attempt to state (and label) these
objections -- which derive, in turn, from the nature of legal materials, from their relation to society and from the peculiar features of Indian law. First, legal materials are normative rather than descriptive.
They are so immersed in technicalities and at the same time so given to rhetorical idealizations as to obscure rather than reveal social realities. Second, doctrine does not necessarily reflect practice.
The actual behariour of regulators and regulated does not necessarily bear any constant relation to doctrine;
doctrine, therefore, provides no reliable index either of actual pattern of regulative activity or of the degree of conformity of the behaviour purportedly regulated.
Third, nationwide generalizations are of little value. India is a vast and heterogeneous society.
Since the law largely ignores local conditions in favour of nationwide generalizations, it is of little value in understanding local conditions and inevitably obtrudes misleading generalizations. Finally, Indian law is foreign. Much the greater part of modern Indian law is palpably non-Indian in origin and it notoriously incongruent with the attitudes and concern of most Indians.xxxvii
Therefore it is felt indispensable by present researcher to touch the facet of 'Cyber crime' and mechanism of its legal control from various perspectives; sometime within periphery of legal circumference and sometime stepping out of it. This article deals with concepts like Cyber crime from the viewpoint of components of 'Criminality' at national and international level and at the same time the impact of 'Globalization' and 'Information Technology'. In addition, what so far this trio offered to Legal system to cope up with the problem of 'Cyber-criminalityβ in India. It underline theme is, how far the present legal system need to upgrade to deal with the crime of new millennium.
iv. Indian legal system - A compound mixture of traditional and Modern It is interesting to note down that Indian society is neither completely modernized, nor completely traditional one. We fail to accept modernized thought and fall short to reject colonial past.
Therefore, here we are having advance law dealing with computer virus and hacking passed in third millenniumxxxviii and also the law dealing crime like
thugxxxix, the crime, which is hardly exist today.
This clearly shows that the Indian Legal system is trying to balance between traditional old pattern and struggling hard to switch over the new one. It is also
THEME THEME THEME
THEME BASED PAPER BASED PAPER BASED PAPER BASED PAPER
Cyber Criminality & It's Legal Control: Fighting With Stones In Jet Age Page 56 keep into mind that merely the new legislation does
not solve the problem of modernization. It requires that system should be modified from the top to bottom level. Legislation is only one part of the legal system. To change the system to make it compatible for new emerging problems, it is essential that it should be changed at every level, including substantial and procedural level too.
CYBER CYBER CYBER
CYBER ---- CRIMINALITY, GLOBALISATION AND CRIMINALITY, GLOBALISATION AND CRIMINALITY, GLOBALISATION AND CRIMINALITY, GLOBALISATION AND RELATED ISSUES
RELATED ISSUES RELATED ISSUES RELATED ISSUES
Marshal McLuhan in his book Understanding Media said that due to invention of new technology used in the communication mechanism the 'World is reduced to global village'. And it is true to some extend. Today, accessibility to any corner of the world with the help of wireless technology is easily possible. Globalization has shrunken the world and bring world into closed room and can be remained present everywhere by sitting before computers.
The Globalization and Information & Technology has added different flavours to Cyber-criminality. This give different dimensions to the concept Cyber crime. It is essential to view Cyber crime from various angles like criminality, globalization and Information & Communication Technology.
Today, technology has already changed the concept of time and space. One can remain present anywhere, anytime, and participate. In read sense, today, the world is shrinking into space and time.
With the above vision, in forthcoming sections, issues relating to criminality, Globalization and Information & Communication Technology have been discussed.
CYBER CRIMINALITY CYBER CRIMINALITY CYBER CRIMINALITY
CYBER CRIMINALITY ---- NATUR NATUR NATUR NATURE AND SCOPE E AND SCOPE E AND SCOPE E AND SCOPE
i. Criminality is omnipresent - Crimeless society is a myth
Crime is a socially correlated phenomenon. The confirmation of crime-existence can be substantiated from each representative snaps of 'society' reflecting different developmental span. With time, changes occur in the nature, scope, and definitions of crime for given society. Crimeless society is a myth and it is non-separable component of society. Crime, despite branded by various expression, such as philosophically - as human weaknesses, masked demon, necessary social evil or explained scientifically - as genetically disorder,
anthropological disproportionate variation, psychological abnormality, impact of imbalance human composition, always has proved existence with varied degree of rationalization, changing definitions, fluctuating magnitudes, compatible with politico-psychological recognition. Nature of crime, whether simple or complex, depends upon the nature of society.
Thus within the simplest form of society, simple crime exists and as society grows up towards more complexities the magnitude of criminality also attain corresponding complex level. At the same time, preventive and corrective machineries of society are always following up the crime and delinquencies in society. In short, criminality is a relative phenomenon that depends upon not only of the time and of space but influence by the various socio- economical and political riders, as well as even population of the society. In short, study about crime requires verifying all those factors influence and contribute it.
i. The Advanced age and automation process has create fertile land for Cyber-criminality
The age of automation, with stepping scientific advancement, produces new social, economic, and political problems, where the technology instead of providing solution, is an instrumentality of new complex situation to be dealt with. In the present scenario, the legal system though equipped with its tool of logic and reasoning, finds it unable to apply the same efficiently to the arising situation where the facts and even law is difficult to understand and apply. In the words of William Zelermyer, -
'We live in an age of automation. The displacement of human hands by machines has been going on at an accelerated pace. The washing machine has replaced the scrubbing board; the automatic transmission, the shift stick; the typewriter, penmanship; the computer, the pencil. Speed and efficiency have become prime objectives. The machine has outdone man in physical matters, but it is conceived, fed, and controlled by the human mind. New social, economic, and political problems arises with each scientific advance, but no mental machine has yet been devised to grapple with them. An electric saw may produce a swift and clean cut, but the mind travels a longer course and views the scenery on the way. As King Solomon well knew, no satisfactory decision could be
THEME THEME THEME
THEME BASED PAPER BASED PAPER BASED PAPER BASED PAPER
Cyber Criminality & It's Legal Control: Fighting With Stones In Jet Age Page 57 produced by the sharp blow of an axe. We
have no coin-operated courts. Univac may make predictions but cannot make decisions.
The formula of logic is the closest we come to automation in thinking, but its power as an instrument is limited by the scope and accuracy of its premises as well as by the object sought to be achieved.xl
Modern society is on the peak of its advancement.
We have already switched over to the electronic age leaving behind electric age. Vast communication facilities have reduced the world into global village.
Scientific and technology help human being to exhaust its entire limit to taste the fruits of development. Today, it is possible to access any corner of the world (or visually remain present) by sitting in a room. Today, technology has liquidified the barriers of time and space. Are we at the vanishing point?
i. Global connectivity via internet has proved boon for Cyber criminality
Today, feasibility of global connectivity has been facilitated by Cyber-technology. The Internet permits netizens to interact and transact with one another across (and beyond) geographical boundaries with luxurious ease. Internet networking provides its users the ability to migrate from one website to another almost without realizing the complexity (and other legal complexities too) of the software tools that makes this possible.xli
Conventionally, geographical and territorial fragmentation of world by national boundaries and segregation of community on national and territorial index provided at least a facility of deciding jurisdictions of legal systems. However, global connectivity helps to evaporate artificial boundaries and via Internet, you can have your (visual) presence at any time and place.
Internet is a borderless world in the world of geographical borders, which has given rise to one of the most debated problems of determining jurisdiction in disputes pertaining to cross border transactions over the Internet. When we are using the technology consummated globally, it is difficult to control it by local governance, not compatible with cross-border governance.
i. 'Peace-Period' motivated technological inventions and shrink world into global village
Advent of Technology has also provided room to some evils to be crept in. With every invention, uses and misuses are always clubbed together. Similar is the case with Cyber-technology. No doubt, that Cyber culture provides us an electronic base of interaction vis-Γ -vis electric speed to our impulses that is entirely useful in every walk of life.
Nevertheless, the evil effect like Cyber crime also crept in and now we are facing great threat of its impact on world society. Particularly when we are dealing in a globalize village, where mechanical automation is occupying a greater part of human life giving way for more and more scope for mechanical dependence of human being, the human society posing great threat from the categorical criminality like Cyber crime.
ii. Trans-national criminality - the International concern for Cyber crime
The present millennium affected by the process of globalization where there is echoing of information- superhighway within the whole community, the matters seems to be more complicated. Because as known from its trans-national nature, Cyber crime is global phenomenon. The terminology is totally borrowed and its application package entail barrier less jurisdiction.
During the past decade, the growth in the use of the Internet and the (Cyber) space it has created, has developed from science fiction into a socially constructed reality. Cyberspace possesses some unique qualities which create a series of challenges for our existing laws.xlii
Under these situations, the traditional way of nation wide generalization of definition of crime seems to not workable. Particularly with respect to those crimes falling in the categories of trans-national criminality pose some challenges. In different words it can be put as follows:
[Thus] the difficulties lies in properly defining the laws needed to allow for Cyber criminals' apprehension and prosecution. While seemingly a straightforward task, difficult issues are raised. One is whether the definitional scope of Cyber crime should include only laws that prohibit activities targeting computers or should outlaw crime against individuals affected through the computers as well,
THEME THEME THEME
THEME BASED PAPER BASED PAPER BASED PAPER BASED PAPER
Cyber Criminality & It's Legal Control: Fighting With Stones In Jet Age Page 58 such as Cyber stalking and Cyber terrorism.
Another is whether these laws should be focusing Cyber crime specifically targeting only crimes committed by exploiting computer technology. Is it, for example, necessary for a country to add a
"computer fraud" offense if it has already outlawed fraud? Both these issues are national in scope and go only to the nature of legislation a nation should adopt.xliii
Therefore, to wrap Cyber-criminality within national pocket would make regulations irrelevant. It is essential to think about to give international recognition for defensive mechanism against Cyber crime.
ii. Some incidences of Cyber-criminality - The threat is not imaginary
Therefore, though Cyber-stalking is not a new phenomenon, and in real life there are not a less incidences of stalking, the sea change has occur in the phenomenon due to vast difference transpire in Cyber-stalking due to the specialty that Cyber- technology produce for these criminality in general and Cyber-criminality in particular. Thus Cyberspace has proved a boon to these deviants.
Consider some incidences of Cyber-criminality that can be happened to anybody:
Mr. X shocks to see that his 14 years old girl is watching porn, obscene and vulgar websites, though due to her tender age she should not have to access to such porn materials. This is an example of Pornography.
Mrs. P starts to receive obscene calls from the person asking her to meet in deserted place and they are ready to pay for that. First she ignores such calls, but when inquired about it, she shocks to listen that the callers are getting her photos and telephone ID from the website where the information has pasted that she is a secrete slut and anybody can have her if ready to pay. When she makes complaint to police, it has been traced out that somebody has pasted it on the website. As website is registered in America, nothing can be done.
Website owner refuses to provide the name of culprit. This is an example of Cyber-Stalking.
Mr. A finds that whenever he starts using his computer, one massage uses to appear on his screen and he is unable to avoid itβs repeated appearance. While inquiring about, it reveals that virus has infected his computer. Might be due to
any websites or e-mail he has received! This is an example of Virus transplantation.
Mr. D finds that outstanding balance of his ATM card is debited by thousands of rupees. When inquires about, bank has informed him that as per bankβs statement, on a particular date he withdraw the amount but in fact Mr. D never! Banks official personal fear about the money theft committed by anybody by using fake password of Mr. D. This is an example of ATM fraud.
Mr. T complains that his computer system is running deadly slow. It has been observed that his machine memory has full off swam/worm, which eat up the maximum machine memory making the process deadly slow. This is an example of worm/Spam.
When concerned police officer tries to match the fingerprints of culprit with that of fingerprints available in his computer, he is unable to extract data and file is unable to open. It has been discovered that somebody has tampered the data and either extracts useful data or destroys it. It is advised by experts that he will have to re-enter the entire data, which may cost several hoursβ
manpower, money power and mental harassment.
This is an example of Data tampering/theft of data.
A famous website of TV new channel having electronic news agency is unable to access by netizens. It is either displaying unreadable data or giving 'error' massage and unable to display on the computer screen. It is revealed that somebody had hacked it. It causes tremendous lost of time, manpower, money, market and reputation to the news agency. This is an example of hacking.
Mr. H has purchased Internet hours for surfing the Internet from his home. But to his surprise, after surfing few minutes, he receives massage from ISP (Internet Service Provider) that his time of surfing is over. After investigation, he comes to know that somebody has committed theft of his Internet hours from different computer using his password and Internet ID. This is an example of theft of Internet Hours.
Mr. G approaches to his bank for withdrawal;
however, he is informed that his balance was almost
βnilβ. His bank account is displaying the entries that money has been already withdrawn from his bank account a couple of days earlier. It is afterward unearthed that one of the bank intruders (might be
THEME THEME THEME
THEME BASED PAPER BASED PAPER BASED PAPER BASED PAPER
Cyber Criminality & It's Legal Control: Fighting With Stones In Jet Age Page 59 employee or even outsider having frequent and
convenient access to the server) fraudulently misappropriated and transferred the fund from the account of Mr. G to another's account. It is learnt afterward that the programming into the Bank computers and making miner changes in the software running the computer systems of the bank has materialized the transfer. This is an example of e-fraud.
These several examples can be quoted here which are based on the real incidences. However, main gist of these problems lies in computer related crime that is now dawning into reality in the Cyber-space and it requires urgent attention.
GLOBALIZATION: CONCEPT NATURE AND SCOPE
i. Globalization - Dismantling national barriers
Globalization implies dismantling of national barriers to carry on production and distribution activities with the objective of deriving optimal benefits in the production and distribution.xliv The process of globalization is, basically, termed to be phenomenon correlated with economical activities as the motivational factors for globalize activities is moneymaking or profit making. Nevertheless, it affects and impresses its impact on other section of life. Thus as it basically understood, the process of globalization starts with economical interests of the front fostering other interest within.
ii. The Neo-Globalization - Old wine in new bottle
This is, in generally, wrong conviction that globalization is a modern process. Actually, it is an old wine in new bottle. Thus when East India Company was incorporated on 31st December 1600 A.D. with prime objective to trade in the eastern part of the world, keeping economic interest as objectives on their memorandum, but while solidifying those objectives in colonies, gradually other interests were crept in and their activities were not restricted to trading activities. During the course of time, these European countries were engaged in the battle amongst themselves and with native rulers. Race of grabbing more and more territories was begun. In Asian and African continent, these European countries were fighting for their illegitimate share. And in India, ultimately Britisher emerged as fortunate invader and succeeded to overthrow
French and Portuguese and Duchess except in few parts. The process was common throughout the world except European continent and even America was soon grabbed by British Empire under their reign.
Though America soon overcame the foreign rule, other poor nations were not enough fortunate to overthrow iron pawn of these powerful and advanced European giants. Particularly, Asian and African nations were fallen pray to these rulers and get exploited almost till middle of 20th century and it was only after the Second World War they could breathe the free air of independence after fall of big powers. The course adopted by these European Big-powers to find out routes for the nation for trading purpose and search for the market, which could provide raw material for their industries as well as serve as consumer market for their industrial product can be conveniently termed as
"Globalisation".
Therefore, even though today, the globalization seems to be new in its forms and features, but it is old wine in new bottle, only with following variations.
iii. Neo-Globalization - Its new variations over the past
Recent wave of globalization is restricted only to acquire the territory and established the rule over the provinces. During 15th and 16th centuries, globalization took place in curiosity of new territories, for new business opportunities by undertaking valiant voyage by European nations followed by military operations. Operations under physical observation were unique key of medieval wave of globalization.
Today, the situation is entirely changed. Technology has provided drastic dimensions breaking the bond of time and space restrictions. Anybody can be acquired character of omnipresence just by remaining connected through networking. Thus, the territory has lost its importance and value. Today, physical barriers are meaningless as nobody is interested in occupying the land. There is no military invasion, no king, not a single royal troop, nor a need of battle necessary to penetrate into land. But there is multinational companies having huge amount and technology to invest and well equipped with money-power, machine-power and muscle power too!!!
Secondly, in recent wave of globalization, 'electrons' are sufficient medium for globalizing the world.